未修补的 Linux 内核漏洞

发布于 2024-09-25 18:44:09 字数 1459 浏览 9 评论 0原文

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(3

梦在深巷 2024-10-02 18:44:09

大多数(找不到更好的词)像 Gentoo 和 Slackware 这样的硬核发行版已经修补了一周左右的时间。此外,某些配置根本不易受到攻击,而其他配置在技术上也容易受到攻击,但在已发布的漏洞中则不然。

对于极度偏执的人,您可以执行以下操作:

  • 直接从 git 分支修补您自己的内核。这是第一次相当难以弄清楚的事情,但一旦设置后实际上很容易维护。您选择的发行版可能会为其内核维护自己的公共 git 分支,这些分支很可能在大约两周前合并到已发布的修复分支中以进行测试。即使他们正在等待它进入官方上游版本,git 也可以非常轻松地合并来自许多不同来源的分支,因此您不必等待。
  • 配置您的内核以获得您实际需要的最少功能。据我了解,如果虚拟化所需的某些选项被关闭,此漏洞就不是问题。相比之下,库存发行版内核使一切都能够满足每个人的需求。此外,已发布的漏洞依赖于 /proc/kallsyms 中可用的内核符号表。该选项可以关闭,并且没有理由大多数人都需要它。
  • 使用强制访问控制为来宾用户和互联网公开的应用程序提供必要的最低权限。

所有这些预防措施的缺点是您更有可能破坏系统,这就是为什么大多数面向用户的发行版花时间进行测试的原因。

Most of the more—for lack of a better word—hardcore distros like Gentoo and Slackware have been patched for a week or so. Also, certain configurations were not vulnerable at all, and others were technically vulnerable, but not with the published exploits.

For the ultra-paranoid, here are some things you can do:

  • Patch your own kernel straight from the git branch. This is something that is fairly difficult to figure out the first time, but actually pretty easy to maintain once it is set up. Your distro of choice probably maintains their own public git branches for their kernels, which most likely merged in the published fix branch close to two weeks ago for testing. Even if they are waiting for it to go into the official upstream release, git makes it super easy to merge branches from many different sources, so you don't have to wait yourself.
  • Configure your kernel for the bare minimum of features you actually need. It is my understanding that this vulnerability isn't a problem if certain options needed for virtualization are turned off. By contrast, stock distro kernels enable everything to be able to cater to everyone. Also, the published exploit relies on the kernel symbol table being available in /proc/kallsyms. This option can be turned off and there's no reason most everyone would ever need it.
  • Use mandatory access control to give your guest users and internet-exposed apps the bare minimum privileges necessary.

The downside of all that precaution is that you're more likely to break your system, which is why most user-oriented distros take their time with testing.

遗失的美好 2024-10-02 18:44:09

实际上,补丁已于 9 月 14 日编写,可以找到 此处此处。然而这个补丁还没有被合并到主线上。内核编程非常困难。补丁可能会破坏兼容性或导致系统行为不正确。微软通常需要1个月的时间来为任何东西编写补丁,甚至是记事本。

通常,攻击者可能会破坏用户级进程,例如您的守护进程之一(unrealircd 或 sendmail)。或者更有可能是像 Wordpress 或 PHP-Nuke 这样的 Web 应用程序。此时攻击者已经拥有了一个用户帐户,并且如果需要的话可以获得root。因此,像这样的特权升级漏洞通常与其他漏洞利用链一起使用。

更令人担忧的是,Toravolds 因 静默补丁。这也是 Microsoft 喜欢的消遣。

Actually a patch was written on September 14th and can be found here and here. However this patch has not been merged over to the mainline. Kernel programming is very difficult. A patch can break compatibility or cause the system to behave incorrectly. Microsoft usually takes 1 month to write a patch for anything, even notepad.

Often times an attacker can compromise a user-level process such as one of your Daemons (unrealircd or sendmail). Or even more likely a web application like Wordpress or PHP-Nuke. At this point the attacker has a user account and can obtain root if he needs it. So privilege escalation exploit like this is often used in a chain with other exploits.

On a more concerning note Toravolds is notorious for silent patches. This is also a pastime that Microsoft enjoys.

热风软妹 2024-10-02 18:44:09

根据 lwn.net

为了更加面向社区
发行版(Debian、Fedora、
openSUSE、Ubuntu 等),
反应有些复杂。
Ubuntu、Debian 和 Fedora 已修复
这两个错误均于 9 月 17 日发布(或者,
对于 Debian,只有一个,如
其稳定分布(“Lenny”)是
基于 2.6.26,因此不是
易受攻击的 CVE-2010-3301)。开放SUSE
尚未发布修复程序,并且没有
我们的二次分布
轨道(Gentoo、Mandriva、Slackware、
等)也已推出修复程序。

因此,如果你的 ubuntu 确实是最新的,那么它应该很早就安全了。
另外,我记得在该错误公布后不久就看到了更新。

因此,要么修复不正确,要么您的系统没有正确更新,并且已经有两周没有更新了。内核更新需要重新启动系统。

顺便问一下,编程问题在哪里?

According to lwn.net :

For the more community-oriented
distributions (Debian, Fedora,
openSUSE, Ubuntu, and others), the
response has been somewhat mixed.
Ubuntu, Debian, and Fedora had fixes
out on September 17 for both bugs (or,
in the case of Debian, just one, as
its stable distribution ("Lenny") is
based on 2.6.26 and thus not
vulnerable CVE-2010-3301). openSUSE
has yet to release a fix and none of
the secondary distributions that we
track (Gentoo, Mandriva, Slackware,
etc.) has put out a fix either.

So if your ubuntu is really up-to-date, it shouldhave been safe quite early.
Plus I remember seeing the update relatively soon after the bug was announced.

So either the fix is incorrect, or your system are not updated correctly, and have not been for something like two weeks. Kernel updates need a reboot of your system.

Where is the programming question, by the way ?

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文